CCNP Enterprise Advanced Routing Official Cert Guide Questions and Answers
CCNP Enterprise Advanced Routing Official Cert Guide Questions and Answers
Answer : B and D
Answer : A and C
a. ipconfig
b. show ip interface
c. arp -a
d. show ip arp
Answer : B
4. What is the correct order of operations for the DHCP for IPv4 process?
2
Chapter 1 : IPv4/IPv6 Addressing and Routing Review
Answer : D
a. ip address dhcp
b. ip helper-address
c. ip dhcp-forwarder
d. ip dhcp server
Answer : B
a. ip dhcp client
b. ip dhcp server
c. ip address dhcp
d. ip helper-address
Answer : C
7. What protocol is used with IPv6 to determine the MAC address of a device in the
same local area network?
d. Neighbor Solicitation
Answer : C
8. Which of the following are true when using EUI-64? (Choose two.)
b. The interface MAC address is used with FFFE added to the middle.
c. The seventh bit from the left in the MAC address is flipped.
d. The seventh bit from the right in the MAC address is flipped.
3
Chapter 1 : IPv4/IPv6 Addressing and Routing Review
Answer : B and C
d. ipv6 nd ra suppress
Answer : A
10. Which of the following are requirements for stateless address autoconfiguration to
function? (Choose three.)
Answer : A, B and C
11. Which command is used to enable a router to inform clients that they need to get
additional configuration information from a DHCPv6 server?
a. ipv6 nd ra suppress
d. ipv6 nd other-config-flag
Answer : D
12. What command enables you to configure a router interface as a DHCPv6 relay
agent?
a. ipv6 forwarder
b. ipv6 helper-address
4
Chapter 1 : IPv4/IPv6 Addressing and Routing Review
Answer : C
13. Which two data structures reside at the router’s data plane?
a. IP routing table
b. ARP cache
d. Adjacency table
Answer : C and D
a. show ip route
b. show ip arp
c. show ip cef
Answer : C
15. Which of the following populate a routing protocol’s data structure, such as the
EIGRP topology table? (Choose three.)
b. Redistributed routes
d. Static routes
Answer : A, B and C
16. Which of the following has the lowest default administrative distance?
a. OSPF
b. EIGRP (internal)
c. RIP
d. Ebgp
Answer : D
5
Chapter 1 : IPv4/IPv6 Addressing and Routing Review
a. 90
b. 110
c. 115
d. 120
Answer : B
a. Provide the static route with a metric higher than the preferred source of theroute.
b. Provide the static route with a metric lower than the preferred source of the route.
c. Provide the static route with an AD higher than the preferred source of the route.
d. Provide the static route with an AD lower than the preferred source of the route.
Answer : C
19. What occurs when you create an IPv4 static route with an Ethernet interface
designated instead of a next-hop IP address?
a. The router uses ARP to get the MAC address of the directly connected router’s IP
address.
b. The router forwards the packet with the destination MAC address FFFF:FFFF:FFFF.
c. The router uses ARP to get the MAC address of the IP address in the source of the
packet.
d. The router uses ARP to get the MAC address of the IP address in the destination of
the packet.
Answer : D
6
Chapter 2 : EIGRP
Chapter 2 : EIGRP
Answer : B
2. How many packet types does EIGRP use for inter-router communication?
a. Three
b. Four
c. Five
d. Six
e. Seven
Answer : C
Answer : C
Answer : A
5. What attributes does the EIGRP topology table contain? (Choose all that apply.)
7
Chapter 2 : EIGRP
Answer : A, B, C and E
6. What destination addresses does EIGRP use when feasible? (Choose two.)
a. IP addre s s 224.0.0.9
b. IP addre s s 224.0.0.10
c. IP addre s s 224.0.0.8
d. MAC address 01:00:5E:00:00:0A
e. MAC address 0C:15:C0:00:00:01
Answer : B and D
7. The EIGRP process is initialized by which of the following technique? (Choose two.)
a. Using the interface command ip eigrp as-number ipv4 unicast
b. Using the global configuration command router eigrp as-number
c. Using the global configuration command router eigrp process-name
d. Using the interface command router eigrp as-number
Answer : B and C
8. True or false: The EIGRP router ID (RID) must be configured for EIGRP to be able to
establish neighborship.
a. True
b. False
Answer : B
9. True or false: When using MD5 authentication between EIGRP routers, the key-
chain sequence number can be different, as long as the password is the same.
a. True
b. False
8
Chapter 2 : EIGRP
Answer : B
10. Which value can be modified on a router to manipulate the path taken by EIGRP
but does not have impacts on other routing protocols, like OSPF?
a. Interface bandwidth
b. Interface MTU
c. Interface delay
d. Interface priority
Answer : C
9
Chapter 3 : Advanced EIGRP
Answer : B
Answer : F
3. When a path is identified using EIGRP and in a stable fashion, the route is
considered_____.
a. passive
b. Dead
c. Active
d. Alive
Answer : A
4. How does an EIGRP router indicate that a path computation is required for a
specific route?
a. EIGRP sends out an EIGRP update packet with the topology change notification
flag set.
b. EIGRP sends out an EIGRP update packet with a metric value of zero.
c. EIGRP sends out an EIGRP query with the delay set to infinity.
10
Chapter 3 : Advanced EIGRP
d. EIGRP sends a route withdrawal, notifying other neighbors to remove the route
from the topology table.
Answer : C
Answer : B
Answer : B
7. True or false: EIGRP stub site functions can be deployed at all branch sites,
regardless of whether downstream EIGRP routers are present.
a. True
b. False
Answer : A
Answer : D
11
Chapter 4 : Troubleshooting EIGRP for IPv4
1. Which command enables you to verify the routers that have formed EIGRP
adjacencies with the local router, how long they have been neighbors, and the
current sequence numbers of EIGRP packets?
a. show ip eigrp interfaces
b. show ip eigrp neighbors
c. show ip route eigrp
d. show ip protocols
Answer : B
2. Which of the following are reasons EIGRP neighbor relationships might not
form?(Choose three.)
a. Different autonomous system numbers
b. Different K values
c. Different timers
d. Different authentication parameters
Answer : A, B and D
Answer : A
4. Which command enables you to verify EIGRP authentication, split horizon, and
configured EIGRP timers?
a. show ip interfaces
b. show ip protocols
c. show ip eigrp interfaces detail
d. show ip eigrp neighbor
12
Chapter 4 : Troubleshooting EIGRP for IPv4
Answer : C
5. Besides a neighbor relationship not being formed, which three of the following are
reasons routes might be missing in an EIGRP autonomous system? (Choose three.)
a. Interface not participating in the EIGRP process
b. Filters
c. Incorrect stub configuration
d. Passive interface feature
Answer : A, B and C
6. Which command enables you to verify whether any route filters have been
applied to an EIGRP-enabled interface?
a. show ip interface brief
b. show ip interface
c. show ip protocols
d. show ip eigrp interface
Answer : C
7. Which command enables you to verify the maximum paths configured for load
balancing and whether unequal-path load balancing has been enabled?
a. show ip protocols
b. show ip eigrp interfaces
c. show ip eigrp neighbors
d. show ip interfaces
Answer : A
8. You have a DMVPN network that has a hub and three spokes. The spokes are not
learning the routes of the other spokes. Of the following options, which is most likely
the reason for this?
a. Split horizon is enabled on the GRE interfaces of the spokes
b. Split horizon is enabled on the hub’s mGRE interface
c. Split horizon is disabled on the hub’s mGRE interface
d. Split horizon is disabled on the GRE interfaces of the spokes
13
Chapter 4 : Troubleshooting EIGRP for IPv4
Answer : B
9. An EIGRP summary route is not showing up on the expected routes in the AS. Which
of the following questions should you answer while troubleshooting? (Choose three.)
a. Did you enable route summarization on the correct interface?
b. Did you associate the summary route with the correct EIGRP autonomous system?
c. Did you create the appropriate summary route?
d. Did you create a route to NULL0?
Answer : A, B and C
10. The IP addressing scheme for your routing domain is discontiguous. What
command should you use in EIGRP configuration mode to make sure that you do not
have any routing issues in your EIGRP autonomous system?
a. no auto-summary
b. auto-summary
c. passive-interface
d. network ip_address wildcard_mask
Answer : A
14
Chapter 5 : EIGRPv6
Chapter 5 : EIGRPv6
1. What address does the EIGRPv6 hello packet use for the destination address?
a. MAC address 00:C1:00:5C:00:FF
b. MAC address E0:00:00:06:00:AA
c. IP address 224.0.0.8
d. IP address 224.0.0.10
e. IPv6 address FF02::A
f. IPv6 address FF02::8
Answer : E
Answer : C
Answer : D
4. Which EIGRPv6 command is used to verify whether any interfaces have been
configured as passive interfaces?
a. show ipv6 protocols
b. show ipv6 eigrp interfaces detail
c. show ipv6 eigrp neighbors detail
15
Chapter 5 : EIGRPv6
Answer : A
5. Which EIGRPv6 command enables you to verify whether the local router is a stub
router?
a. show ipv6 protocols
b. show ipv6 eigrp interfaces detail
c. show ipv6 eigrp neighbors detail
d. show ipv6 eigrp topology
Answer : A
Answer : C
7. Which of these commands can you use to verify which interfaces are participating
int he named EIGRP IPv4 address family? (Choose two.)
a. show ip eigrp interfaces
b. show eigrp address-family ipv4 interfaces
c. show ipv6 eigrp interfaces
d. show eigrp address-family ipv6 interfaces
Answer : A and B
16
Chapter 5 : EIGRPv6
Answer : B and D
9. What must be permitted within an IPv6 ACL for an EIGRPv6 neighbor adjacency to
be formed?
a. FF02::A
b. FF02::10
c. The link-local address of the neighboring device
d. The global address of the neighboring device
Answer : A and C
17
Chapter 6 : OSPF
Chapter 6 : OSPF
Answer : C
2. How many packet types does OSPF use for inter-router communication?
a. Three
b. Four
c. Five
d. Six
e. Seven
Answer : C
3. What destination addresses does OSPF use, when feasible? (Choose two.)
a. IP address 224.0.0.5
b. IP address 224.0.0.10
c. IP address 224.0.0.8
d. MAC address 01:00:5E:00:00:05
e. MAC address 01:00:5E:00:00:0A
Answer : A and D
4. True or false: A router with an interface associated to Area 1 and Area 2 can inject
routes learned from one area into another area.
a. True
b. False
18
Chapter 6 : OSPF
Answer : B
5. True or false: A member router contains a complete copy of the LSDBs for every
area in the routing domain.
a. True
b. False
Answer : B
6. How many states does OSPF maintain when dealing with a neighbor adjacency?
a. Three
b. Four
c. Five
d. Eight
Answer : D
7. True or false: The OSPF process ID must match for routers to establish a neighbor
adjacency.
a. True
b. False
Answer : B
8. True or false: OSPF is only enabled on a router interface by using the command
network ip-address wildcard-mask area area-id under the OSPF router process.
a. True
b. False
Answer : B
9. True or false: An advertised default route into OSPF always appears as an OSPF
19
Chapter 6 : OSPF
inter-area route.
a. True
b. False
Answer : B
10. True or false: The router with the highest IP address is the designated router when
using a serial point-to-point link.
a. True
b. False
Answer : B
11. What command is configured to prevent a router from becoming the designated
router for a network segment?
a. The interface command ip ospf priority 0
b. The interface command ip ospf priority 255
c. The command dr-disable interface-id under the OSPF process
d. The command passive interface interface-id under the OSPF process
e. The command dr-priority interface-id 255 under the OSPF process
Answer : A
12. What is the advertised network for the loopback interface with IP address
10.123.4.1/30?
a. 10.123.4.1/24
b. 10.123.4.0/30
c. 10.123.4.1/32
d. 10.123.4.0/24
Answer : C
20
Chapter 6 : OSPF
13. The OSPF dead interval defaults to how many times the hello interval?
a. Two
b. Three
c. Four
d. Five
Answer : C
14. True or false: Enabling OSPF authentication for an area consists of setting the OSFP
authentication type under the OSPF process and placing the password on all area
interfaces.
a. True
b. False
Answer : A
21
Chapter 7 : Advanced OSPF
1. How many OSPF link-state advertisements (LSAs) are used for routing traditional
IPv4 packets?
a. Two
b. Three
c. Five
d. Six
e. Seven
Answer : D
Answer : D
Answer : C
4. True or false: When an ABR receives a network LSA, the ABR forwards the network
LSA to the other connected areas.
a. True
b. False
22
Chapter 7 : Advanced OSPF
Answer : B
5. An OSPF stub area blocks which types of LSAs from being injected into the area by
the ABR? (Choose two.)
a. Type 1 LSA
b. Type 3 LSA
c. Type 4 LSA
d. Type 5 LSA
Answer : C and D
Answer : B
Answer : A
8. True or false: If two different routers are redistributing the same network (such as
10.1.1.0/24) as an OSPF external Type 2 route, and they have the same metric, both
paths are installed on a downstream router.
a. True
b. False
23
Chapter 7 : Advanced OSPF
Answer : B
9. True or false: Breaking a large OSPF topology into smaller OSPF areas can be
considered a form of summarization.
a. True
b. False
Answer : A
Answer : B
11. When a Type 3 LSA is received on a nonbackbone area, what does the ABR do?
a. Discards the Type 3 LSA and does not process it
b. Installs the Type 3 LSA for only the area for which it was received
c. Advertises the Type 3 LSA to the backbone area and displays an error
d. Advertises the Type 3 LSA to the backbone area
Answer : B
12. True or false: Virtual link is another term for an OSPF-enabled GRE tunnel.
a. True
b. False
24
Chapter 7 : Advanced OSPF
Answer : B
25
Chapter 8 : Troubleshooting OSPFv2
1. Which of the following prevent OSPF neighbor relationships from forming? (Choose
three.)
a. Mismatched timers
b. Mismatched area numbers
c. Duplicate router IDs
d. Wrong designated router elected
Answer : A, B and C
2. In which OSPF states are you likely to find routers that have an MTU mismatch?
(Choose two.)
a. Init
b. 2-Way
c. ExStart
d. Exchange
Answer : C and D
3. Which OSPFv2 command enables you to verify the hello interval and the dead
interval?
a. show ip protocols
b. show ip ospf interface
c. show ip ospf neighbor
d. show ip ospf database
Answer : B
4. Which OSPFv2 debug command enables you to verify whether area numbers are
mismatched?
26
Chapter 8 : Troubleshooting OSPFv2
Answer : B
Answer : A
6. Which LSA type describes routes outside the area but still within the OSPF routing
domain (interarea routes)?
a. 1
b. 2
c. 3
d. 5
Answer : C
7. Which of the following can prevent an OSPF neighborship from being formed?
a. A distribute list applied inbound
b. A distribute list applied outbound
c. An ACL applied inbound
d. An ACL applied outbound
Answer : C
27
Chapter 8 : Troubleshooting OSPFv2
8. OSPF neighborships have been successfully formed throughout the entire routing
domain. Which of the following are reasons any router may be missing routes in the
local LSDB or the local routing table? (Choose two.)
a. The missing route’s network interface has been configured as passive.
b. There are duplicate router IDs in the routing domain.
c. There is an outbound distribute list configured.
d. The spoke is the DR in a hub and spoke topology.
Answer : B and D
Answer : C
10. Which of the following are reasons a virtual link might not be forming? (Choose
two.)
a. The router’s interface IP address is being used in the virtual-link command.
b. The local area ID is being used in the virtual-link command.
c. The router ID is being used in the virtual-link command.
d. The transit area ID is being used in the virtual-link command.
Answer : A and B
28
Chapter 9 : OSPFv3
Chapter 9 : OSPFv3
1. What protocol number does OSPFv3 use for its inter-router communication?
a. 87
b. 88
c. 89
d. 90
Answer : C
2. How many packet types does OSPFv3 use for inter-router communication?
a. Three
b. Four
c. Five
d. Six
e. Seven
Answer : C
Answer : C
4. True or false: On a brand-new router installation, OSPFv3 requires only an IPv6 link-
local address to be configured and OSPFv3 to be enabled on that interface to form
an OSPFv3 neighborship with another router.
29
Chapter 9 : OSPFv3
a. True
b. False
Answer : B
5. True or false: OSPFv3 support for IPv4 networks only requires that an IPv4 address
be assigned to the interface and that the OSPFv3 process be initialized for IPv4.
a. True
b. False
Answer : B
6. Which OSPFv3 flooding scope correlates to the links between two routers?
a. The link-local scope
b. The neighbor scope
c. The process scope
d. The autonomous system scope
Answer : A
30
Chapter 10 : Troubleshooting OSPFv3
1. What can be verified with the output of show ipv6 protocols? (Choose two.)
a. The router ID
b. Which areas are normal, stub, and not-so-stubby
c. The interfaces participating in the routing process
d. The ID of the designated router
Answer : A and C
2. Which of the following are true about the output of show ipv6 ospf interface brief?
(Choose two.)
a. The cost of the interface is listed.
b. The DR/BDR state of the neighbor is listed.
c. The area an interface is participating in is listed.
d. The network type of the interface is listed.
Answer : A and C
3. Which IPv6 OSPFv3 command enables you to verify the configured hello interval
and the dead interval?
a. show ip protocols
b. show ip ospf interface
c. show ip ospf neighbor
d. show ip ospf database
Answer : B
31
Chapter 10 : Troubleshooting OSPFv3
Answer : C and D
5. Which IPv6 OSPFv3 LSA is used to describe prefixes outside an area but that are still
within the OSPF routing domain?
a. Router link states
b. Net link states
c. Inter-area prefix link states
d. Type 5 AS external link states
Answer : C
6. Which LSA type is only flooded on the local link and is not reflooded by other OSPF
routers?
a. 1
b. 8
c. 3
d. 9
Answer : B
7. Which IPv6 OSPFv3 command enables you to verify whether an area is a stub area,
totally stubby area, NSSA, or totally NSSA?
a. show ipv6 protocols
b. show ipv6 ospf
c. show ipv6 ospf interface
d. show ipv6 ospf neighbor
Answer : B
8. Which IPv6 OSPFv3 command enables you to verify which routers the local router
has formed neighbor adjacencies with?
a. show ipv6 protocols
32
Chapter 10 : Troubleshooting OSPFv3
Answer : D
9. Which OSPFv3 address family commands are used to verify which OSPFv3 address
family an interface is participating in? (Choose two.)
a. show ospfv3
b. show ospfv3 interface brief
c. show ospfv3 neighbor
d. show ospfv3 database
Answer : B and C
10. Which OSPFv3 address family debug command identifies whether there is a
mismatched stub area configuration?
a. debug ospfv3 hello
b. debug ospfv3 packet
c. debug ospfv3 adj
d. debug ospfv3 events
Answer : A
33
Chapter 11 : BGP
Chapter 11 : BGP
1. Which of the following autonomous system(s) are private? (Choose two.)
a. 64,512 through 65,535
b. 65,000 through 65,535
c. 4,200,000,000 through 4,294,967,294
d. 4,265,000 through 4,265,535,016
Answer : A and C
Answer : A
Answer : B
4. True or false: BGP sessions are always one hop away from a neighbor.
a. True
b. False
Answer : B
5. True or false: The IPv4 address family must be initialized to establish a BGP session
with a peer using IPv4 addressing.
a. True
b. False
34
Chapter 11 : BGP
Answer : B
6. Which command is used to view the BGP neighbors and their hello interval?
a. show bgp neighbors
b. show bgp afi safi neighbors
c. show bgp afi safi summary
d. show afi bgp interface brief
Answer : B
Answer : C
8. True or false: A route learned from an eBGP peer is advertised to an iBGP neighbor.
a. True
b. False
Answer : A
9. True or false: A route learned from an iBGP peer is advertised to an iBGP neighbor.
a. True
b. False
Answer : A
10. Which of the following are considering iBGP scalability enhancements? (Choose
two.)
a. Route reflectors
b. BGP route aggregation
c. BGP confederations
d. BGP alliances
35
Chapter 11 : BGP
Answer : A and C
11. True or false: The IPv6 address family must be initialized to establish a BGP session
with a peer using IPv6 addressing.
a. True
b. False
Answer : A
12. True or false: IPv6 prefixes can be advertised only across a BGP session
established with IPv6 addresses.
a. True
b. False
Answer : B
36
Chapter 12 : Advanced BGP
Answer : B
Answer : B
3. Which extended ACL entry allows any network in the 172.16.x.x network with a /24
to /32 prefix length?
a. permit ip 172.16.0.0 0.0.255.255 255.255.255.0 0.0.0.255
b. permit ip 172.16.0.0 255.255.0.0 0.0.255.255 0.0.0.0
c. permit ip 172.16.0.0 255.255.0.0 255.255.255.0 0.0.0.255
d. permit ip 172.16.0.0 0.0.255.255 0.0.255.255 0.0.0.0
Answer : A
4. Which command displays only the network prefixes that originate from AS 40 or AS
45?
a. show bgp ipv4 unicast regexp _40|45$
b. show bgp ipv4 unicast regexp ^40|45
c. show bgp ipv4 unicast regexp _4(0|5)$
d. show bgp ipv4 unicast regexp _[40,45]$
37
Chapter 12 : Advanced BGP
Answer : C
5. True or false: A BGP AS_Path ACL and a prefix list can be applied to a neighbor at
the same time.
a. True
b. False
Answer : A
Answer : D
7. A router has been configured with the command neighbor 10.12.1.2 maximum-
prefix 100. What happens when the BGP peer advertises 101 prefixes to it?
a. The 101st prefix overwrites the 1st prefix in the Loc-RIB table.
b. The 101st prefix is discarded.
c. The BGP session is shut down.
d. The 101st prefix is received and installed in the Loc-RIB table, and a warning
message is generated.
Answer : C
8. What is the primary difference between a BGP peer group and a peer template?
a. They can have different inbound routing policies.
b. They can have different outbound routing policies.
c. They can have different BGP authentication settings.
d. They can have different BGP timers.
Answer : A
38
Chapter 13 : BGP Path Selection
1. True or false: BGP summarization provides a mechanism for load balancing traffic
between service providers.
a. True
b. False
Answer : A
2. True or false: A BGP router advertises every path for a prefix so that every neighbor
can build its own topology table.
a. True
b. False
Answer : B
3. Which of the following techniques is the second selection criterion for the BGP best
path?
a. Weight
b. Local preference
c. Origind. MED
Answer : B
4. True or false: A router deletes a path from the Loc-RIB table after detecting that the
current best path is inferior to a new superior path for a network prefix.
a. True
b. False
Answer : B
5. In the BGP best-path algorithm, what attribute does BGP use after network
origination (local, aggregation, received by peer) to select the best path?
a. Local preference
b. AS_Path
39
Chapter 13 : BGP Path Selection
Answer : C
Answer : A
7. True or false: MED can only be compared between three or more different Ass.
a. True
b. False
Answer : B
8. True or false: When BGP multipathing is enabled, a router can select multiple paths
as the best path so that they can all be installed into the RIB.
a. True
b. False
Answer : B
40
Chapter 14 : Troubleshooting BGP
1. Which commands enable you to identify the IPv4 unicast BGP neighbor
adjacencies that have been formed? (Choose two.)
a. show ip route bgp
b. show bgp ipv4 unicast
c. show bgp ipv4 unicast summary
d. show bgp ipv4 unicast neighbors
Answer : C and D
2. In the output of show bgp ipv4 unicast summary, how can you determine whether
a neighbor relationship is successfully established?
a. The neighbor is listed in the output.
b. The Version column has a 4 in it.
c. The State/PfxRcd column has a number in it.
d. The State/PfxRcd column has the word Active in it.
Answer : C
3. Which of the following are reasons a BGP neighbor relationship might not
form?(Choose two.)
a. The BGP timers are mismatched.
b. The BGP packets are sourced from the wrong IP address.
c. The neighbor is reachable using a default route.
d. The network command is misconfigured.
Answer : B and C
Answer : C
41
Chapter 14 : Troubleshooting BGP
Answer : B
6. What could prevent a route from being advertised to another BGP router? (Choose
three.)
a. Mismatched timers
b. Split-horizon rule
c. Missing network mask command
d. Route filtering
Answer : B, C and D
7. Which command enables you to verify the IPv4 BGP routes that have been learned
from all BGP neighbors?
a. show ip route bgp
b. show bgp ipv4 unicast
c. show bgp ipv4 unicast summary
d. show bgp ipv4 unicast neighbors
Answer : A
8. What occurs when the next hop of a BGP-learned route is not reachable?
a. The route is discarded.
b. The route is placed in the BGP table and advertised to other neighbors.
c. The route is placed in the BGP table and not marked as valid.
d. The route is placed in the BGP table and in the routing table.
Answer : C
42
Chapter 14 : Troubleshooting BGP
a. A BGP router that receives a BGP route from an iBGP peering shall not advertise
that route to another router that is an iBGP peer.
b. A BGP router that receives a BGP route from an eBGP peering shall not advertise
that route to another router that is an iBGP peer.
c. A BGP router that receives a BGP route from an eBGP peering shall not advertise
that route to another router that is an eBGP peer.
d. A BGP router that receives a BGP route from an iBGP peering shall discard the
route.
Answer : A
10. Which of the following administrative distances are correct? (Choose two.)
a. 20 for eBGP
b. 20 for iBGP
c. 200 for eBGP
d. 200 for iBGP
Answer : A and D
11. Which of the following correctly identifies the order of BGP attributes for the best-
path decision process?
a. Weight, local preference, route origin, AS_Path, origin code, MED
b. AS_Path, origin code, MED, weight, local preference, route origin
c. Local preference, weight, route origin, AS_Path, origin code, MED
d. Weight, local preference, route origin, AS_Path, MED, origin code
Answer : A
Answer : A and C
43
Chapter 14 : Troubleshooting BGP
13. Which command enables you to verify the IPv6 unicast BGP routes that have
been learned?
a. show bgp ipv6 unicast
b. show bgp ipv6 unicast summary
c. show bgp ipv6 unicast neighbor
d. show ipv6 route bgp
Answer : A
44
Chapter 15 : Route Maps and Conditional Forwarding
1. True or false: An extended ACL that is used to match routes changes behavior if
the routing protocol is an IGP rather than BGP.
a. True
b. False
Answer : A
2. Which network prefixes match the prefix match pattern 10.168.0.0/13 ge 24?
(Choose two.)
a. 10.168.0.0/13
b. 10.168.0.0/24
c. 10.173.1.0/28
d. 10.104.0.0/24
Answer : B and C
3. What happens when the route map route-map QUESTION deny 30 does not
contain a conditional match statement?
Answer : A
45
Chapter 15 : Route Maps and Conditional Forwarding
4. What happens to a route that does not match the PrefixRFC1918 prefix list when
using the following route map?
Answer : A
5. True or false: When there are multiple conditional matches of the same type, only
one must be met for the prefix to match.
a. True
b. False
Answer : A
a. True
b. False
Answer : B
46
Chapter 16 : Route Redistribution
1. R1 learns the 10.11.11.0/24 prefix from EIGRP. EIGRP is redistributed into OSPF on R1,
and OSPF is redistributed into BGP on R1. R1 advertises all the BGP network prefixes to
R3. Does R3 receive the 10.11.11.0/24 prefix?
a. Yes
b. No
Answer : B
a. 90
b. 110
c. 170
d. 200
Answer : C
a. 20
b. 100
c. 32,768
d. infinity
Answer : A
47
Chapter 16 : Route Redistribution
4. R1 learns the 10.11.11.0/24 prefix from EIGRP. EIGRP is redistributed into OSPF on R1.
R1 has an OSPF adjacency with R2. R2 redistributes OSPF into BGP. R2 advertises all
BGP network prefixes to R3. Does R3 receive the 10.11.11.0/24 prefix?
a. Yes
b. No
Answer : A
a. 150
b. 110
c. 180
d. 200
Answer : B
a. 20
b. 100
c. 32,768
d. infinity
Answer : D
a. ospf-external-prefixes redistributable
48
Chapter 16 : Route Redistribution
c. ospf redistribute-internal
d. None
Answer : D
a. ospf-external-prefixes redistributable
b. match external
c. bgp redistribute-internal
d. none
Answer : C
49
Chapter 17 : Troubleshooting Redistribution
1. Which of the following are methods that can be used to solve routing issues
caused by multipoint redistribution? (Choose all that apply.)
a. Modify the seed metrics of the redistributed routes.
b. Modify the administrative distances of redistributed routes.
c. Tag routes as they are redistributed and then deny them from being redistributed
back into the originating routing source.
d. Modify the metric used to reach the boundary routers.
Answer : A, B and C
2. Which of the following methods can be used to solve suboptimal routing issues
caused by redistribution?
a. Modify the seed metrics of the redistributed routes.
b. Modify the administrative distances of redistributed routes.
c. Redistribute only classless networks.
d. Modify the metrics of the routes before redistribution.
Answer : A
Answer : C
50
Chapter 17 : Troubleshooting Redistribution
4. What must be true for a route from one routing source to be redistributed into
a different routing source?
a. The routing sources must have similar metrics.
b. The routing sources must have similar administrative distances.
c. The route must be in the routing table on the router performing redistribution.
d. The route must be a directly connected route on the router performing
redistribution.
Answer : C
Answer : A and B
6. Which of the following routing protocols has a default seed metric of 20?
a. RIPng
b. EIGRP for IPv6
c. OSPFv3
d. BGP
Answer : C
7. When redistributing, you have four options for the seed metric: accepting the
default value, specifying it with the default-metric command, using the metric option
with the redistribute command, and using a route map. If all four of these are
configured with different values, which will be preferred?
a. Default values
b. default-metric command
51
Chapter 17 : Troubleshooting Redistribution
Answer : D
Answer : A
10. Which option is mandatory when redistributing classless networks into OSPF?
a. metric
b. metric type
c. subnets
d. match
Answer : C
11. Which of the following is not included when redistributing from one IPv6 routing
protocol into another IPv6 routing protocol?
a. A prefix
b. A seed metric
Answer : C
12. During redistribution that uses route maps, what occurs to a route that matches a
deny entry in the route map?
52
Chapter 17 : Troubleshooting Redistribution
Answer : D
53
Chapter 18 : VRF, MPLS, and MPLS Layer 3 VPNs
Answer : A
Answer : C
3. You have created a VRF instance called RED and associated the required
interfaces with it. Which command is used to verify the contents of the VRF routing
table?
a. show ip cef
b. show ip vrf
c. show ip route vrf
d. show ip route vrf RED
Answer : D
54
Chapter 18 : VRF, MPLS, and MPLS Layer 3 VPNs
Answer : C
Answer : A
Answer : C
Answer : C
8. What types of labels are used for MPLS Layer 3 VPNs? (Choose two.)
a. LDP label
b. VPN label
c. 802.1q label
d. MPLS label
55
Chapter 18 : VRF, MPLS, and MPLS Layer 3 VPNs
Answer : A and B
Answer : D
10. How are customer routes isolated on PE routers in an MPLS Layer 3 VPN?
a. By using VRF
b. By using VDCs
c. By using MP-BGP
d. By using LDP
Answer : A
56
Chapter 19 : DMVPN Tunnels
Answer : A, B, C, D and E
Answer : B
3. Which DMVPN phase does not work well with route summarization of spoke
prefixes?
a. DMVPN Phase 1
b. DMVPN Phase 2
c. DMVPN Phase 3
d. DMVPN Phase 4
Answer : B
57
Chapter 19 : DMVPN Tunnels
Answer : C
Answer : A
6. What is the configuration difference between DMVPN Phase 1 and DMVPN Phase 2
on the hub router?
a. The use of the command ip nhrp shortcut
b. The use of the command ip nhrp redirect
c. The use of the command ip nhrp version 2
d. There is no difference in configuration.
Answer : D
7. What is the configuration difference between DMVPN Phase 2 and DMVPN Phase 3
on the spoke router?
a. The use of the command ip nhrp shortcut
b. The use of the command ip nhrp redirect
c. The use of the command ip nhrp version 3
d. There is no difference in configuration.
Answer : A
8. True or false: After a spoke router registers with the hub router, the hub router sends
communication to the spoke router to establish a full mesh of tunnels with other
spoke routers.
a. True
b. False
58
Chapter 19 : DMVPN Tunnels
Answer : B
9. What does the syslog message “Midchain parent maintenance for IP midchain
out” indicate?
a. There is a problem with the PKI certifi cate infrastructure.
b. There is a recursive routing loop on the tunnel.
c. The remote peer has placed its tunnel in maintenance mode.
d. The encapsulating interface has been shut down.
Answer : B
Answer : A
11. Which of the following issues do network engineers commonly overlook when
using IPv6 DMVPN tunnels?
a. Changing the MTU on the tunnel interface to accommodate the larger packet
header
b. Confi guring a link-local IP address on the tunnel interface
c. Placing the tunnel into IPv6 GRE multipoint mode
d. Confi guring the NBMA address in CIDR notation (for example, 2001:12:14::1/64)
Answer : B
59
Chapter 20 : Securing DMVPN Tunnels
1. In an MPLS Layer 3 VPN WAN model, data is protected on the SP network because
of which mechanism?
a. Data confi dentiality is protected because MPLS Layer 3 VPNs include encryption
on the SP network.
b. Data integrity is maintained because MPLS Layer 3 VPNs include checksums on
the SP network.
c. Data integrity is not protected on the SP network.
d. Data confi dentiality is dependent on the SP’s processes.
Answer : D
2. Which IPsec security mechanism ensures that if a hacker gains access to a session
key, that person cannot maintain access to that session indefinitely?
a. Replay detection
b. Periodic rekey
c. Perfect forward secrecy
d. Encapsulating Security Payload
Answer : C
3. True or false: The IKEv2 keyring functionality allows for the pre-shared key to be set
on a neighbor-by-neighbor basis.
a. True
b. False
Answer : A
4. True or false: Enabling IPsec tunnel encryption involves the configuration of the
IKEv2 profile and its association to a tunnel interface.
60
Chapter 20 : Securing DMVPN Tunnels
a. True
b. False
Answer : B
Answer : A
6. A router has just been configured with IPsec DMVPN tunnel protection and needs
to have the IPsec packet replay feature set the number of packets to 64. Which
command should be used?
a. crypto ipsec security-association replay window-size 64
b. ipsec security-replay window-size 64
c. ipsec window-size 64
d. None. The command is not needed.
Answer : D
61
Chapter 21 : Troubleshooting ACLs and Prefix Lists
Answer : D
2. What occurs to a packet when an ACL is applied to an interface but the packet
does not match any of the entries in the ACL?
a. It is forwarded.
b. It is flooded.
c. It is dropped.
d. It is buffered.
Answer : C
3. What does the following ACL entry accomplish when applied to an interface:
20 permit tcp 10.1.1.0 0.0.0.63 host 192.0.2.1 eq 23?
a. Permits Telnet traffic from the device with IP address 192.0.2.1 going to any
device with an IP address from 10.1.1.0 to 10.1.1.63
b. Permits Telnet traffic from any device with IP address from 10.1.1.0 to 10.1.1.63
going to the device with IP address 192.0.2.1
c. Permits SSH traffic from any device with IP address from 10.1.1.0 to 10.1.1.63
going to the device with IP address 192.0.2.1
d. Permits SSH traffic from the device with IP address 192.0.2.1 going to any device
with IP address from 10.1.1.0 to 10.1.1.63
Answer : B
62
Chapter 21 : Troubleshooting ACLs and Prefix Lists
4. Which command successfully filters ingress traffic using ACL 100 on an interface?
a. access-group 100 in
b. access-class 100 in
c. ip access-group 100 in
d. ip traffic-filter 100 in
Answer : C
Answer : B
6. What happens if you add the following entry to the end of an IPv6 ACL: deny ipv6
any any log? (Choose two.)
a. All traffic is denied and logged.
b. All traffic that does not match an entry in the ACL is denied and logged.
c. ICMP Neighbor Discovery messages are implicitly permitted.
d. ICMP Neighbor Discovery messages are denied.
Answer : B and D
7. Which command successfully filters egress traffic using an IPv6 ACL named ENARSI
on an interface?
a. access-group ENARSI out
b. access-class ENARSI out
63
Chapter 21 : Troubleshooting ACLs and Prefix Lists
Answer : D
Answer : D
Answer : A
10. What routes match the following prefix list: ip prefix-list ENARSI seq 35 deny
192.168.0.0/20 ge 24 le 28?
a. Routes with an address from 192.168.0.0 to 192.168.15.255 with a subnet mask of
24 to 28
b. Routes within the 192.168.0.0/20 subnet with a subnet mask greater than 24 and
less than 28
c. Routes with the subnet ID and mask 192.168.0.0/20
d. Routes with an address from 192.168.0.0 to 192.168.15.255 with a subnet mask of
24 or 28
Answer : A
64
Chapter 22 : Infrastructure Security
Answer : D
Answer : B
aaa new-model
65
Chapter 22 : Infrastructure Security
R1#
Based on the configuration, what will occur when someone uses Telnet to reach the
router?
c. The user will be required to use the username ENARSI with the password EXAM.
d. The user will be granted access either with the username ENARSI with the pass-
word EXAM or with the line password cisco.
Answer : C
4. Which of the following commands would you use if you needed uRPF to match the
return interface with the incoming interface and a default route?
Answer : A
5. Which of the following commands would you use for uRPF if the traffic flow were
asynchronous?
66
Chapter 22 : Infrastructure Security
Answer : C
6. Which of the following commands would you use to verify the number of packets
that have conformed to a specific class map that you are using for CoPP?
a. show access-list
b. show class-map
c. show policy-map
Answer : D
b. From top down, matching the first class map that applies.
c. From bottom up, matching the first class map that applies.
Answer : B
8. What happens when traffic does not match any of the user-defined class maps
specified in the policy map?
a. It is ignored.
b. It is dropped.
c. It is transmitted.
67
Chapter 22 : Infrastructure Security
Answer : D
a. RA Guard
b. DHCPv6 Guard
c. IPv6 ND inspection/snooping
d. Source Guard
Answer : A
10. Which IPv6 First-Hop Security feature is able to validate the source of IPv6 traffic
and, if the source is not valid, block it?
a. RA Guard
b. DHCPv6 Guard
c. IPv6 ND inspection/snooping
d. Source Guard
Answer : D
68
Chapter 23 : Device Management and Management Tools Troubleshooting
1. Which of the following are the default serial terminal settings for a Cisco router or
switch? (Choose two.)
a. 9600 baud
b. 16 data bits
c. 1 stop bit
d. Parity
Answer : A and C
2. Which command enables you to define which protocols will be used for remote
access to a Cisco device using vty lines?
a. transport input
b. login
c. login local
d. Exec
Answer : A
3. Which command enables you to specify that SSH access will be authenticated
using the local database?
a. login
b. login local
c. login authentication default
d. transport input ssh
Answer : B
4. The following command has been typed on a Cisco IOS router: copy
http://10.0.3.8/cisco_ios_files/c3900-universalk9-mz.SPA.156-3.M6a.bin flash:c3900-
universalk9-mz.SPA.156-3.M6a.bin
What will this accomplish?
69
Chapter 23 : Device Management and Management Tools Troubleshooting
Answer : C
5. Timestamps are not appearing with syslog messages on your router. What is most
likely the reason for this?
a. NTP is not configured correctly.
b. The router has the wrong time set, according to the show clock output.
c. The no service timestamps command was executed on the router.
d. You have not used the terminal monitor command.
Answer : C
6. Which of the following is a valid SNMP security level that provides authentication
using a hashing algorithm such as SHA and encryption using an encryption algorithm
such as AES?
a. noAUTHnoPRIV
b. AUTHnoPRIV
c. AUTHPRIV
d. PRIV
Answer : C
Answer : A
70
Chapter 23 : Device Management and Management Tools Troubleshooting
8. Which command is used to verify the version of NetFlow that has been configured
on a router?
a. show ip flow export
b. show ip flow Interface
c. show ip flow cache
d. show flow record
Answer : A
9. Which command is used to verify the flow exporter that has been assigned to a
flow monitor?
a. show flow Interface
b. show flow exporter
c. show flow monitor
d. show flow record
Answer : C
10. Which Cisco DNA Center Assurance tool graphically shows the path that
applications and services running on a client take through all the devices on the
network to reach the destination?
a. Application Experience
b. Device 360
c. Client 360
d. Path Trace
Answer : D
71